-
Notifications
You must be signed in to change notification settings - Fork 79
Command & Control Messages
wmiaw edited this page Oct 3, 2014
·
1 revision
Command and control of one entity from another is a common use-case. Examples include remote controls, software deployments, or distributed operations.
This communication occurs between peer-to-peer entities.
Security Property | API Return Value | Reason |
---|---|---|
Encryption Required | true | Messages may contains confidential and sensitive data. |
Integrity Protection Required | true | Data modification may result in incorrect or invalid data being used for the operation, or unintended operations being executed. |
Non-Replayable Required | true | Messages typically result in application state changes and should not be replayed. |
Service Tokens Expected | false | No service tokens are expected. |
User Associated | stringUserAuthenticationData |
The request is made on behalf of the specific user. User authentication data must be provided if a user ID token does not already exist. |
Security Property | API Return Value | Reason |
---|---|---|
Encryption Required | true | The response may contain confidential or sensitive data. |
Integrity Protection Required | true | Data modification may result in incorrect or invalid data being used for the operation, or unintended operations being executed. |
Non-Replayable Required | true | Messages typically result in application state changes and should not be replayed. (An incremented message ID is not sufficient for non-replayability in a peer-to-peer network as either entity may initiate communication.) |
Service Tokens Expected | false | No service tokens are expected. |
User Associated | stringUserAuthenticationData |
The request is made on behalf of the specific user. User authentication data must be provided if a user ID token does not already exist. |
A Netflix Original Production
Tech Blog | Twitter @NetflixOSS | Jobs
- Introduction
- Encoding & Normalization
- Cryptography
- Versioning
- MSL Networks
- Entity Authentication
- User Authentication
- Key Exchange
- Service Tokens
- Messages
- Error Messages
- Application Security Requirements
- Protocol Implementation
- Configuration Guide